the Presentation
Download
Report
Transcript the Presentation
Artificial Intelligence.
Real Threat Prevention.
Grant Moerschel
Director of Sales Engineering
We make software that…
predicts cyber attacks and
blocks them on the
endpoint in real-time
before they ever execute.
• Prevents malware pre-execution
• Silences memory attacks, exploits, privilege
escalation, fileless attacks
• Thwarts unauthorized scripts
• Rejects potentially unwanted programs
(PUPs) from entering the environment
• Uncovers the presence of powerful tools
that can be used against you
• All without prior knowledge
• Protection is not Cloud dependent
2
| © 2015 Cylance, Inc.
CylancePROTECT
leverages the power of
machines, not humans, to
dissect malware’s DNA.
Artificial intelligence then
determines if the code is
safe to run.
3
| © 2015 Cylance, Inc.
• Approved by Microsoft. We can stand alone
or complement what you have.
• No signatures / infrequent updates
• Ultra light agent footprint
• SaaS convenience
• Deployment simplicity
• Privacy friendly
• Mac OS X support
2016 Gartner Endpoint Protection Platforms Magic Quadrant
• The Visionary Quadrant Leader
• “Cylance is easily the fastest growing EPP startup in
the last ten years.”
• “The Cylance machine-learning algorithm has been
demonstrated to be very accurate at detecting new
variants and repacked versions of existing malware.”
• “Cylance will appeal to organizations looking for
improved zero day malware protection, those
looking for low impact protection for resource
constrained platforms, and systems that are
disconnected and cannot rely on regular signature
updates.”
4
| © 2015 Cylance, Inc.
Risk vs. Cost
Control Types
RESPOND
Risk
Where most of the industry is focused
Highest Risk
Highest Cost
Most Liability
DETECT
PREVENT
Lowest Risk
Lowest Cost
Limited Liability
Automated
Cost
Semi-Automated
Manual
Control Approaches
5
Focus is on
Minimizing
damage – only
variables are time
to detect and time
to contain
| © 2015 Cylance, Inc.
Source: Upcoming Release of Managing Risk and Information Security 2nd Edition – Malcolm Harkins
Focus is on
Minimizing
vulnerability and
potential for
harm
The Future of Security
Present
Past
Cylance
z
AV
Pre-Execution
Humans Needed
6
| © 2015 Cylance, Inc.
HIPS / ANTI-EXPLOITATION
SANDBOXING
Post-Execution
ISOLATION
EDR
Pre-Execution
No Humans
Several Reasons Why Legacy Approaches are Broken
AV Engines Can’t Keep Up
Signatures Don’t Scale
Mutations are the Rule not the Exception
Humans are Required
Network Encryption Makes You Blind
7
| © 2015 Cylance, Inc.
What is CylancePROTECT?
Unrivaled Threat Prevention & Protection
PREdictive
PREvention
PRE-Execution
PRE-Zero-Day
Enterprise Ready
•
•
•
•
•
Malware | Exploits | Scripts
Microsoft Approved AV
Windows & Mac OS X
SaaS Convenience
PCI-DSS / HIPAA Compliant
Lightweight & Flexible
• 1-3% CPU / ~40 MB Memory Footprint
8
| © 2015 Cylance, Inc.
DEMO
9
| © 2015 Cylance, Inc.
Cylance Unlocks the DNA of Malware
Elastic Cloud Computing Now
Makes it Possible
• We have 1000’s of nodes in AWS
• Algorithmic science puts machines to
work
Machine Learning Under the Hood
① Collect both good & bad files
② Extract features
③ Train & Vectorize features
④ Classify & Cluster
⑤ A.I. produces confidence score
Threat Indicators
• Anomalies, Destruction
• Data Loss, Deception
10 | © 2015 Cylance, Inc.
The Benefits of PROTECT
What We Do:
Analyze Malware at the
DNA-Level
99% Threat Prevention
We Do NOT:
Rely on Human
Classifications
Require
On-Premise
Infrastructure
No Updates Needed
No Internet
Connection Needed!
11 | © 2015 Cylance, Inc.
PREdictive & PREventative
Heuristics
Behavioral
Analysis
Wait for Threats
to Execute
Require Updates
No Reliance on
Human Knowable Indicators
Signatures
MicroVirtualization
Sandboxing
Who We Are
$77M
in funding from
Awards
12 | © 2015 Cylance, Inc.
500+ Customers. 1,200,000+ Endpoints
Questions?